{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:50:42Z","timestamp":1774716642218,"version":"3.50.1"},"reference-count":108,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"CODI","award":["2014-856"],"award-info":[{"award-number":["2014-856"]}]},{"name":"CODI","award":["Sostenibilidad 2014-2015"],"award-info":[{"award-number":["Sostenibilidad 2014-2015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/tnsm.2016.2598420","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:22:21Z","timestamp":1470421341000},"page":"518-532","source":"Crossref","is-referenced-by-count":770,"title":["Resource Allocation in NFV: A Comprehensive Survey"],"prefix":"10.1109","volume":"13","author":[{"given":"Juliver","family":"Gil Herrera","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7072-8924","authenticated-orcid":false,"given":"Juan Felipe","family":"Botero","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.17487\/rfc7498","article-title":"Problem statement for service function chaining","author":"quinn","year":"2015"},{"key":"ref38","year":"2015","journal-title":"The Internet Engineering Task Force Service Function Chaining Working Group Documents"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113223"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref31","year":"2014","journal-title":"Network Function Virtualisation (NFV) Management and Orchestration"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113220"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.328"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113227"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113226"},{"key":"ref28","first-page":"1","article-title":"Functional and structural convergence of fixed\/mobile access networks","author":"pachnicke","year":"2015","journal-title":"Proc ITG Symp Photon Netw"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2014.6983304"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2015.7193560"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2014.6882682"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064897"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912647"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2627585.2627592"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.10.013"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2549563"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.56"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2535401"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940493"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.014"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883423"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7112029"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.090512.00043"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.82"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6968961"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702549"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963800"},{"key":"ref53","year":"2013","journal-title":"Network Functions Virtualisation (NFV) Terminology for Main Concepts in NFV"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417401"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7665","article-title":"Service function chaining (SFC) architecture","author":"halpern","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref3","article-title":"A survey of enterprise middlebox deployments","author":"sherry","year":"2012"},{"key":"ref6","year":"2016"},{"key":"ref5","first-page":"22","article-title":"Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action","author":"chiosi","year":"2012","journal-title":"Proc SDN OpenFlow World Congr"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113221"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113219"},{"key":"ref9","year":"2014","journal-title":"Network Functions Virtualisation (NFV) Architectural Framework"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2010.26"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355737"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.030912.120082"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.endm.2016.03.028"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122811.00060"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477662"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.029"},{"key":"ref73","author":"makhorin","year":"2012","journal-title":"GLPK GNU Linear Programming Kit"},{"key":"ref72","volume":"42","author":"wolsey","year":"1998","journal-title":"Integer Programming"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218511"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140281"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2015.7413643"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140470"},{"key":"ref74","year":"2012","journal-title":"ILOG CPLEX Optimizer High-Performance Software for Mathematical Programming and Optimization"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014205"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.1002\/9780470496916","volume":"74","author":"talbi","year":"2009","journal-title":"Metaheuristics From Design to Implementation"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367346"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045397"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335301"},{"key":"ref61","year":"2015","journal-title":"Network Functions Virtualisation (NFV) Infrastructure Hypervisor Domain"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045400"},{"key":"ref64","author":"rosen","year":"2013","journal-title":"Resource management Linux kernel namespaces and cgroups"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2498176"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2014.6876564"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SaCoNeT.2014.6867768"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018201"},{"key":"ref69","first-page":"1","article-title":"Alevin&#x2014;A framework to develop, compare, and analyze virtual network embedding algorithms","volume":"37","author":"fischer","year":"2011","journal-title":"Open Access J Electron Commun EASST"},{"key":"ref1","year":"2011","journal-title":"C-RAN The Road Towards Green RAN White Paper Version 2 5"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.55"},{"key":"ref108","article-title":"On the energy efficiency prospects of network function virtualization","volume":"abs 1512 215","author":"mijumbi","year":"2015","journal-title":"CoRR"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417447"},{"key":"ref107","first-page":"1","article-title":"Validation as a service (VAAS)","author":"lu","year":"2016","journal-title":"Proc IEEE SDN EIT Digit Federated Testbeds Workshop"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.034"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.65"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952725"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524565"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367390"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502433"},{"key":"ref90","first-page":"104","article-title":"Online admission control and embedding of service chains","author":"lukovszki","year":"2015","journal-title":"Proc SIROCCO"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502415"},{"key":"ref102","article-title":"Service function chaining simplified","volume":"abs 1601 751","author":"ghaznavi","year":"2016","journal-title":"CoRR"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116121"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.68"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2015.7387400"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.035"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref11","article-title":"Stratos: A network-aware orchestration layer for middleboxes in the cloud","volume":"abs 1305 209","author":"gember","year":"2013","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367338"},{"key":"ref13","article-title":"Network functions virtualisation&#x2014;Network operator perspectives on industry progress","year":"2013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7437249"},{"key":"ref15","year":"2015","journal-title":"Draft Document"},{"key":"ref16","article-title":"Opnfv: An open platform to accelerate NFV","author":"price","year":"2012"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4067186"},{"key":"ref17","article-title":"Network functions virtualisation: Network operator perspectives on industry progress","author":"cui","year":"2014","journal-title":"Proc SDN OpenFlow World Congr"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335318"},{"key":"ref18","year":"2013","journal-title":"Network Functions Virtualisation (NFV) Use Cases"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838412"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140280"},{"key":"ref83","year":"2015","journal-title":"ALEVIN&#x2014;ALgorithms for Embedding VIrtual Networks"},{"key":"ref80","first-page":"1","article-title":"Modelling the NFV forwarding graph for an optimal network service deployment","author":"riera","year":"2015","journal-title":"Proc IEEE ICTON"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248361"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2015.2388585"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116188"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116162"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2015.7114738"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/7580587\/07534741.pdf?arnumber=7534741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T15:29:18Z","timestamp":1749050958000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7534741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":108,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2016.2598420","relation":{},"ISSN":["1932-4537"],"issn-type":[{"value":"1932-4537","type":"print"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}